Use the following questions as a guide to generate supporting arguments for your case. You may conduct a quick search for links/videos that may provide you with discussion points. Please contribute your arguments to the page by clicking on the Edit button, type out your points and save.
Tweet any interesting links/articles/videos you find using the hashtags #educ5103 #telemed5103
Choose one member of your group to present your arguments to the class.
.
(General question for both pro and con groups) - One remaining significant technological limitation to telesurgery is the lack of haptic (tactile) feedback - can you think of any limitations in educational technology that are similarly waiting for the technology to catch up?
Verizon seems to love the idea of remote telesurgery happening over its commercial fibre-optic network. Would performing telesurgery over a public network carry any risk? For example, investigate “distributed denial of service” - could this be a potential cyber-terrorism risk.
Task instructions:
- Watch the video on Fiber Optic Surgery.
- Use the following questions as a guide to generate supporting arguments for your case. You may conduct a quick search for links/videos that may provide you with discussion points. Please contribute your arguments to the page by clicking on the Edit button, type out your points and save.
- Tweet any interesting links/articles/videos you find using the hashtags #educ5103 #telemed5103
- Choose one member of your group to present your arguments to the class.
.(General question for both pro and con groups) - One remaining significant technological limitation to telesurgery is the lack of haptic (tactile) feedback - can you think of any limitations in educational technology that are similarly waiting for the technology to catch up?
Verizon seems to love the idea of remote telesurgery happening over its commercial fibre-optic network. Would performing telesurgery over a public network carry any risk? For example, investigate “distributed denial of service” - could this be a potential cyber-terrorism risk.